Posts Tagged ‘Twitter’

Countdown to Mass Effect 3

Last Updated on Wednesday, 7 March 2012 03:35Written by servbot_killMonday, 5 March 2012 05:53

So there’s been a crapload of stuff going around about the upcoming release of Mass Effect 3, but none as crazy as the apparent War of the Worlds-type shit going on at @AllianceNewsNet on Twitter. It just started updating regularly since this morning (a little before noon on the east coast of the USA) with messages ostensibly from reporter Emily Wong, who you might remember helping out on a couple of investigative journalism quests from ME1. Apparently, shit’s gone south in Los Angeles as the Reaper invasion has *just* hit there, and the FTL communications buoy blackout a week before (on Twitter, literally about a week) results in her having to communicate via a consumer-grade (I guess) quantum entanglement communicator that, being crappy and not at all like the Illusive Man’s resources, limits her to Twitter.

This is a social networking campaign in action, folks. Save this for a case study.

Anyways, the latest tweets (as of 5:54 pm EST) detail the intrepid Ms. Wong and a UCLA researcher testing out a Reaper weapon recovered from a corpse. What it is, I don’t know, but are we perhaps talking hints of DLC weaponry already?

Botnet Using Twitter

Last Updated on Saturday, 27 March 2010 11:03Written by DarkKnightH20Saturday, 15 August 2009 03:13

This is definitely to be expected. As I made apparent in my DDoS text, botnets are very flexible in the way that they can be controlled and that they’re only limited by the creator’s creativity. The article can be read at Arbor Networks, but I’ll provide an excerpt for those who have only the slightest bit of time to read or no interest–

While digging around I found a botnet that uses Twitter as its command and control structure. Basically what it does is use the status messages to send out new links to contact, then these contain new commands or executables to download and run. The account in question is under analysis by Twitter’s security team. I spotted it because a bot uses the RSS feed to get the status updates.

The article continues to go on to show some messages were base64 encoded, PKZIP was used, and the exes were packed with UPX (highly detectable packer that leaves a signature in the exe and is just overall popular and therefore easily unpacked]). Using Twitter was an interesting (but bad) idea, but this isn’t as “omg” as people think. Tagboards can be used, forums can be used, irc servers — basically any website that allows for the public posting of informaton with little (to no) moderating. This Twitter botnet was easy to find because of the suspicious page setup. If being anonymous is key to someone, then using something way less public with a high difficulty to put two-in-two together is essential.